Commit 62acadda authored by Atul Kumar Pant's avatar Atul Kumar Pant Committed by Paul Moore

audit: add space before parenthesis and around '=', "==", and '<'

Fixes following checkpatch.pl issue:
ERROR: space required before the open parenthesis '('
ERROR: spaces required around that '='
ERROR: spaces required around that '<'
ERROR: spaces required around that '=='
Signed-off-by: default avatarAtul Kumar Pant <atulpant.linux@gmail.com>
[PM: subject line tweaks]
Signed-off-by: default avatarPaul Moore <paul@paul-moore.com>
parent b59bc6e3
...@@ -470,7 +470,7 @@ static void fill_ac(acct_t *ac) ...@@ -470,7 +470,7 @@ static void fill_ac(acct_t *ac)
do_div(elapsed, AHZ); do_div(elapsed, AHZ);
btime = ktime_get_real_seconds() - elapsed; btime = ktime_get_real_seconds() - elapsed;
ac->ac_btime = clamp_t(time64_t, btime, 0, U32_MAX); ac->ac_btime = clamp_t(time64_t, btime, 0, U32_MAX);
#if ACCT_VERSION==2 #if ACCT_VERSION == 2
ac->ac_ahz = AHZ; ac->ac_ahz = AHZ;
#endif #endif
......
...@@ -221,7 +221,7 @@ static int audit_match_signal(struct audit_entry *entry) ...@@ -221,7 +221,7 @@ static int audit_match_signal(struct audit_entry *entry)
entry->rule.mask)); entry->rule.mask));
} }
switch(audit_classify_arch(arch->val)) { switch (audit_classify_arch(arch->val)) {
case 0: /* native */ case 0: /* native */
return (audit_match_class_bits(AUDIT_CLASS_SIGNAL, return (audit_match_class_bits(AUDIT_CLASS_SIGNAL,
entry->rule.mask)); entry->rule.mask));
...@@ -243,7 +243,7 @@ static inline struct audit_entry *audit_to_entry_common(struct audit_rule_data * ...@@ -243,7 +243,7 @@ static inline struct audit_entry *audit_to_entry_common(struct audit_rule_data *
err = -EINVAL; err = -EINVAL;
listnr = rule->flags & ~AUDIT_FILTER_PREPEND; listnr = rule->flags & ~AUDIT_FILTER_PREPEND;
switch(listnr) { switch (listnr) {
default: default:
goto exit_err; goto exit_err;
#ifdef CONFIG_AUDITSYSCALL #ifdef CONFIG_AUDITSYSCALL
...@@ -344,7 +344,7 @@ static int audit_field_valid(struct audit_entry *entry, struct audit_field *f) ...@@ -344,7 +344,7 @@ static int audit_field_valid(struct audit_entry *entry, struct audit_field *f)
switch (entry->rule.listnr) { switch (entry->rule.listnr) {
case AUDIT_FILTER_FS: case AUDIT_FILTER_FS:
switch(f->type) { switch (f->type) {
case AUDIT_FSTYPE: case AUDIT_FSTYPE:
case AUDIT_FILTERKEY: case AUDIT_FILTERKEY:
break; break;
...@@ -651,7 +651,7 @@ static struct audit_rule_data *audit_krule_to_data(struct audit_krule *krule) ...@@ -651,7 +651,7 @@ static struct audit_rule_data *audit_krule_to_data(struct audit_krule *krule)
data->fields[i] = f->type; data->fields[i] = f->type;
data->fieldflags[i] = audit_ops[f->op]; data->fieldflags[i] = audit_ops[f->op];
switch(f->type) { switch (f->type) {
case AUDIT_SUBJ_USER: case AUDIT_SUBJ_USER:
case AUDIT_SUBJ_ROLE: case AUDIT_SUBJ_ROLE:
case AUDIT_SUBJ_TYPE: case AUDIT_SUBJ_TYPE:
...@@ -717,7 +717,7 @@ static int audit_compare_rule(struct audit_krule *a, struct audit_krule *b) ...@@ -717,7 +717,7 @@ static int audit_compare_rule(struct audit_krule *a, struct audit_krule *b)
a->fields[i].op != b->fields[i].op) a->fields[i].op != b->fields[i].op)
return 1; return 1;
switch(a->fields[i].type) { switch (a->fields[i].type) {
case AUDIT_SUBJ_USER: case AUDIT_SUBJ_USER:
case AUDIT_SUBJ_ROLE: case AUDIT_SUBJ_ROLE:
case AUDIT_SUBJ_TYPE: case AUDIT_SUBJ_TYPE:
...@@ -946,7 +946,7 @@ static inline int audit_add_rule(struct audit_entry *entry) ...@@ -946,7 +946,7 @@ static inline int audit_add_rule(struct audit_entry *entry)
int dont_count = 0; int dont_count = 0;
/* If any of these, don't count towards total */ /* If any of these, don't count towards total */
switch(entry->rule.listnr) { switch (entry->rule.listnr) {
case AUDIT_FILTER_USER: case AUDIT_FILTER_USER:
case AUDIT_FILTER_EXCLUDE: case AUDIT_FILTER_EXCLUDE:
case AUDIT_FILTER_FS: case AUDIT_FILTER_FS:
...@@ -1029,7 +1029,7 @@ int audit_del_rule(struct audit_entry *entry) ...@@ -1029,7 +1029,7 @@ int audit_del_rule(struct audit_entry *entry)
int dont_count = 0; int dont_count = 0;
/* If any of these, don't count towards total */ /* If any of these, don't count towards total */
switch(entry->rule.listnr) { switch (entry->rule.listnr) {
case AUDIT_FILTER_USER: case AUDIT_FILTER_USER:
case AUDIT_FILTER_EXCLUDE: case AUDIT_FILTER_EXCLUDE:
case AUDIT_FILTER_FS: case AUDIT_FILTER_FS:
...@@ -1083,7 +1083,7 @@ static void audit_list_rules(int seq, struct sk_buff_head *q) ...@@ -1083,7 +1083,7 @@ static void audit_list_rules(int seq, struct sk_buff_head *q)
/* This is a blocking read, so use audit_filter_mutex instead of rcu /* This is a blocking read, so use audit_filter_mutex instead of rcu
* iterator to sync with list writers. */ * iterator to sync with list writers. */
for (i=0; i<AUDIT_NR_FILTERS; i++) { for (i = 0; i < AUDIT_NR_FILTERS; i++) {
list_for_each_entry(r, &audit_rules_list[i], list) { list_for_each_entry(r, &audit_rules_list[i], list) {
struct audit_rule_data *data; struct audit_rule_data *data;
......
...@@ -2124,7 +2124,7 @@ static void handle_path(const struct dentry *dentry) ...@@ -2124,7 +2124,7 @@ static void handle_path(const struct dentry *dentry)
d = dentry; d = dentry;
rcu_read_lock(); rcu_read_lock();
seq = read_seqbegin(&rename_lock); seq = read_seqbegin(&rename_lock);
for(;;) { for (;;) {
struct inode *inode = d_backing_inode(d); struct inode *inode = d_backing_inode(d);
if (inode && unlikely(inode->i_fsnotify_marks)) { if (inode && unlikely(inode->i_fsnotify_marks)) {
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment